Advisories.
Every advisory below is signed against the ceremony root, including advisories for AI model bundles and evidence-policy packs. Critical and high-severity advisories are also signed PGP in-line for email distribution. The advisory feed is part of the customer console — you do not have to read this page to learn about advisories affecting your deployment, AI models, or evidence workflows. We publish here so that everyone else can read what your auditor will read.
2026.
- info 3DC-2026-05-A1 — CRYSTALS-Dilithium migration plan
Roadmap to hybrid Ed25519 + Dilithium-3 signing across the ceremony root, build keys, and printer-side HSMs. Phase-0 shadow signatures are already running on the production fleet; phase-1 hybrid co-signing scheduled 2026 Q4. No customer action required for phase-0; phase-1 requires a routine firmware update per RB-25.- info 3DC-2026-04-A2 — MeshGuard field measurement programme results
Eighteen-month field study results: watermark survival rate across 41 sites, 11 material classes, 7 slicer builds. Headline FPR and detection latency hold against the original specification. Four investigated failure cases attached to the report.- medium 3DC-2026-04-N1 — Materialise Magics slicer attestation in progress
Materialise Magics is moving to attested-slicer profile, scoped 2026 Q3. Customers using Magics will operate in degraded attestation mode during the transition window; the TwinCert record records this honestly. Customers requiring fully-attested slicers should plan to use Prusa, Cura, Orca, or Bambu Studio in the meantime.- info 3DC-2026-03-A1 — TwinCert profile for NIS2 / EU CRA
The TwinCert JSON-LD profile for NIS2 and EU CRA, with explicit article-level mappings. Adopted by two notified bodies as part of their conformity assessment intake. Customers in scope of NIS2 should align their TwinCert profile to the published one.- medium 3DC-2026-02-N1 — manifest schema v3 published
Manifest schema v3 is published. v2 manifests continue to be accepted by the verifier-CLI under a 12-month deprecation window. Migration is automatic on the next routine firmware update.- deprecated 3DC-2026-01-D1 — bundle schema v1 retirement
Bundle schema v1 (introduced 2024) is hard-retired in 2026 Q4. v2 bundles have been the default since 2025; production fleets are already on v2 or v3. Hard retirement means the verifier-CLI 2026.10+ will refuse to verify v1 bundles. Audit packages of historical parts produced under v1 should be re-signed with v3 bundles before the cut-off.
2025.
- info 3DC-2025-11-A1 — Vault3D firmware update path (RB-25)
The dual-control firmware update procedure (RB-25) is live across the production fleet. No customer action; this advisory is the public record of the procedure's promotion to general availability.- high 3DC-2025-09-A1 — transient HSM unresponsiveness, vendor X cohort
A subset of HSMs (vendor X, firmware versions 4.11–4.13) exhibited transient unresponsiveness under sustained signing load. Patched in HSM firmware 4.14; daemon retry policy hardened in 3dc daemon 2025.10.r4. Affected customers contacted directly during the window.- medium 3DC-2025-08-A1 — pentest H1 2025 findings published
Eleven findings from the H1 2025 external pentest. Two high (remediated within 72h), four medium (remediated within window), five low (tracked). Anonymised report available in signed customer packages.- info 3DC-2025-06-A1 — first production deployment with full TwinCert audit cycle
First customer completed a full audit cycle using TwinCert as the evidence layer; auditor accepted the audit package without manual collation. The customer and auditor are named under the customer's disclosure on request.- deprecated 3DC-2025-04-D1 — bundle schema v1 deprecation announced
Schema v1 is deprecated; the 18-month migration window opens. See 3DC-2026-01-D1 for the hard retirement.- info 3DC-2025-02-A1 — verifier-CLI source publication
The verifier-CLI source is published under a permissive license. Customers can build and verify the binary themselves; the published SHA-256 in the manifest is reproducible from the published source.
2024.
- info 3DC-2024-12-A1 — observer report from ceremony root creation
Independent observer report from the September 2024 ceremony root creation. Observer: Dr. M. Karras (formerly NCSC). Full observer report available in signed customer packages.- info 3DC-2024-09-A1 — ceremony root creation
Ceremony root key was created in September 2024 with a 5-of-9 custodian quorum across three jurisdictions. Public key, fingerprint, and witnessed ceremony record on manifest.- info 3DC-2024-07-A1 — first MeshGuard field deployment
MeshGuard moved from pilot to first production deployment in the spare-parts logistics sector. Field measurement programme commenced; results published in 3DC-2026-04-A2.- info 3DC-2024-04-A1 — company founded; first internal commit
CIPHERSPHERE TECHNOLOGIES LTD incorporated; first internal commit to the Vault3D code base. This advisory exists for completeness.
How to receive advisories.
Three published channels, in order of cadence:
- Customer console feed. Customers see advisories affecting their deployment in the console inbox. Real-time, signed.
- Signed PGP mailing list. All advisories, signed in-line. Subscribe by sending a PGP-signed email to advisories@3dcipher.com; the subscribe handshake is automated and audited.
- RSS / Atom. Available at
/advisories.atom; unsigned, intended for triage tooling only. Do not trust the RSS feed alone; verify against the signed feed before acting.
How to disclose.
If you have a finding to report, please use security@3dcipher.com. PGP fingerprint 0741 9C12 BBEA 4E62 1330 7C5D AE08 5F19 88B0 2E44. We acknowledge within 4 hours during UK working time and within one working day otherwise.
Coordinated disclosure: we follow a standard 90-day disclosure window unless a customer-impact threshold requires shorter. Researchers credited by name unless requested otherwise.